[MUSIC PLAYING] Hi. I'm Bill Evans, a member of the Identity and Access Management team at Dell software. This is the final video of a five part series on the questions you need to ask before purchasing a two-factor authentication solution. If you haven't seen the other parts yet, don't worry. You don't need to watch them in order.
For this session we're going to talk about total cost of ownership, or TCO. Determining the total cost of ownership for some solutions can be quite difficult, as some solution providers try to hide the true cost beyond the most basic installations. To make sure you aren't nickeled and dimed for every little feature, be sure to discuss the following topics.
First are agents. Agents are one of the most common hidden costs. For every device or server that you want to authenticate with using two-factor authentication, you need to ensure that they can use the authentication protocol of your solutions choice. In most cases this will be RADIUS authentication. But there are some solutions that use proprietary protocols. In either case, you will need an agent installed on each device or server that doesn't support the authentication protocol. Some solution providers will charge you extra for their agents in order to support these devices.
Secondly, there are some solution providers that charge for features that make their product easier to deploy and manage. So make sure to ask if they charge for add-ons like user self registration, and web mail.
Again, now that we've outlined what questions you should ask about TCO, let me tell you how Dell's solution Defender is priced. Defender has a very simple pricing model. You pay for a user license and a token license, either hardware or software for each user. Everything else we offer with the solution. Token self registration, web Administration, web mail, all the agents, et cetera, is included.
In addition, first year's maintenance is included with the initial cost, and there are no maintenance fees on hardware or software tokens. Also, as we mentioned in a previous video, Defender software tokens never expire. And its hardware tokens are good for as long as the battery allows. Finally, users can be assigned multiple tokens without the need for additional user licenses, enabling you to provide token flexibility to users in a cost effective manner.
Well that wraps it up for our question on TCO. Remember, the devil is in the details, and not all two-factor authentication solutions are the same. So check out the videos tab on Software.Dell.com/Defender to see any of the other parts of this video series on the questions you need to ask before purchasing a two-factor solution.